Anti-Illuminati Blog

Thursday, December 3, 2009

A poster to the PrisonPlanet Forum asked the following question in response to the recent 12/02/09 CDC figures on Swine Flu infections in the US (14 to 34 million) compared to the deaths associated with Swine Flu:

"If this is correct and the numbers are correct of people who have died worldwide due to the Swine Flu being around 6000 - Then That MEANS THE SWINE FLU IS NOTHING!! Very Very SMALL DEATH RATE!"

..." why the craziness over getting a Vaccine for Something that has Such a LOW mortality rate? WHY the Big Scare? WHY the state of emergency? WHY such media attention over something that is nothing?! Because they know that when they chemtrail the U.S. with the other half of the RNA virus that they split in the lab, that tens of millions to 100 million+ will be murdered in the U.S. Why bother with vaccines?"

Because they know that when they chemtrail the U.S. with the other half of the RNA virus that they split in the lab, that tens of millions to 100 million+ will be murdered in the U.S.

1) To test who will bow down to tyrannical dictatorship (setting precedent for more full spectrum tyranny.)

2) To set the precedent for permanent, huge vaccine manufacturing plants in the U.S. and abroad--which by itself will expand the eugenics agenda even more.

3) To psyop the living f*ck out of everyone and get people to fight with each other with the MSM pushing ultra wicked propaganda that those who educated themselves factually and thoroughly and rejected the inalienable rights-violating, and New World Order bioterrorist "vaccine" caused those who took the vaccine to die (reinforcing fraudulent "herd-immunity") mega psyops.

4) The vaccine creates the total illusion to many people that the CDC and WHO, (and all of their eugenicist complicit medical practitioners) actually give a flying f*ck about the health/well-being of the population, and preemptively psyop conditions the minds of those who claim they have no time to thoroughly research the facts, that they are trying to be the saviors during their own manufactured pandemic. The CDC/WHO can cite all of their warnings years past about global H5N1 pandemic threats as fake legitimization for their current actions by claiming that "we warned you years ago." When the fact is that their criminal eugenicist bioterrorists were responsible for the propagation of H5N1, the creation of SARS (a cover for H5N1) all to lay the groundwork for global fascist, tyrannical bio-surveillance for their own false flags, in exactly the same way as warrantless wiretapping, and other electronic surveillance was allegedly necessary to "prevent another 911."

When the plans for such tyranny had nothing to do with any so called "terror" attacks, but were in fact planned many years in advance to secure the total monopolistic, feudalist global supply chain infrastructure, total evisceration of government by the people, of the people, and for the people, with a global information grid, artificial intelligence driven virtual government where all representation has been supplanted by dictatorship at the camera lenses of NRO satellites, micro, nano UAV's, regular UAV's to shoot and kill, and blow up anyone who dares hold onto the very notion of God-given, non usurp-able rights.

5) The propaganda about the vaccines serves as another huge psyop in and of itself as well. That pysop being that only those who submit or willingly (via ignorance) are at a risk of dying, when the fact is that the vaccines were only used to get the contagious 1st half of their bioweapon globally dispersed. Without the vaccines, there would have been ZERO CHANCE of such a threat, not the "100% chance" as per Nazi eugenicist IBM's confidential internal document.

The criminal enemy terrorist traitors at the CDC/WHO also run constant psyops of "hand-washing" and wiping down surfaces in schools, for example, against a multi-year engineered bioweapon that has had full predictive artificial intelligence computations preemptively calculating all aspects of its virulence, lethality and contagiousness, when released into the real world. Such software enabled the very inception of race-specific bioweapons that Michael Riconosciuto had first-hand knowledge of over 20 years ago.

6) It is entirely possible that anyone (worldwide) that refuses the vaccine, will be fraudulently labeled as a "bioterror threat", or a "threat to national security", replete with the multi-spectrum, carefully gauged psyops that is already being predicted right now by their AI inference engine programs to ensure the maximum probability of their cold blooded, murderous overthrow of the Republic, and all other nations worldwide that have not already submitted to the real terrorists at Bilderberg/RIIA/CFR/CoR/TC/CSIS.

Be on guard for incoming, unprecedented propaganda about the flu, quarantines ("keeping others safe via so-called "social distancing") over the next month and onward--in addition to massive, beyond off the charts demonization of the current IPv4 compatible Internet needing to be replaced by the NWO's enterprise architecture/RBAC/real time truth filter friendly IPv6.

Such demonization of the Internet will include, but not be limited to the following:

1) "Anyonymous" use of the Internet enables cyber-terrorism--solution: thumb, retinal biometric tyranny to authenticate you to even get online to do ANYTHING.

2) "OMFG, American people who do not want to be slaves are on "THE SAME" network as the U.S. military--the ONLY WAY to be safe is to switch to IPv6 so that we can control who has access TO OUR networks!"

3) "Current Internet infrastructure, and most software in use by millions is inherently a threat to the NWO's (i.e. the AFRL) "cyber supremacy"." Solution: All software writers worldwide must be approved by the NWO, be licensed by the NWO, have built in backdoors to the NWO for full spectrum, continuous, persistent tyrannically fascist "supervision" and surveillance.

4) The problem reaction solution implementation of the death ("smart") grid will create its own "sudden demand/need" for "cyber security".

Because it is all Ptech run, it is fully vulnerable to being cyber attacked AT WILL by the NWO Air Force "cyber command" black ops terrorist centers--to usher in further lockdown of any remaining vestiges of freedom, and fraudulently legitimize the utilization of NORTHCOM to being an active role in "securing the smart energy grid" from THEIR OWN FALSE FLAGS which will be blamed on your teengage son or daughter, or anyone you can imagine.

Remember, CSIS's terrorist scum James Lewis, and the global warming believer puppet General for "Lord" Rothschild, David Rockefeller, and Queen Nazi's of England and the Netherlands, Renuart of the criminal, illegitimate NORTHCOM (born out of the largest false flag in world history) himself stated that a teenage kid with torn blue jeans and a PC (or Internet enabled cell phone, thumb drive) is just as much of a threat to critical infrastructure/national security as an entire nation state like China or Russia.

(4) SOFTWARE CONFIGURATION SPECIFICATION LANGUAGEThe Institute shall, establish standard computer-readable language for completely specifying the configuration of software on computer systems widely used in the Federal Government, by government contractors and grantees, and in private sector owned critical infrastructure information systems and networks.

This gives the NWO full control over any private company (and your personal PC in your home) to FORCE backdoors into their systems, where previously there may have been none that were exploitable by the government. This will eliminate any escape from government intrusion, and backdoor access into any system. They will make any use of freedom-promoting operating systems illegal. An example of how they can designate all home computers as "critical infrastructure" is to propagandize on mainstream media - telling people that a bunch of botnets or personal computers were responsible for disrupting government systems, or shutting down a bank (that angle has already been psyop'd to the public, because it fits in as a convenient trump card, due to the manufactured economic crisis).

(7) National compliance standards for all software(A) PROTOCOL- The Institute shall establish a standard testing and accreditation protocol for software built by or for the Federal Government, its contractors, and grantees, and private sector owned critical infrastructure information systems and networks to ensure that it--(i) meets the software security standards of paragraph (2); and(ii) does not require or cause any changes to be made in the standard configurations described in paragraph (4).

This may very well make it unprofitable for anyone other than NWO-funded software companies to make software. Another way of creating a monopoly; cornering the market by making it too expensive for smaller companies to comply with such tryannical bullshit.

(b) CRITERIA FOR STANDARDS- Notwithstanding any other provision of law (including any Executive Order), rule, regulation, or guideline, in establishing standards under this section, the Istitute shall disregard the designation of an information system or network as a national security system or on the basis of presence of classified or confidential information, and shall establish standards based on risk profiles.

This means that every single computer and the ENTIRE internet is considered to be directly a part of the DoD. Everything is the property of the government; and you have zero rights - zero freedom with respect to the use of your own PC in your home.

(2) shall require each Federal agency, and each operator of an information system or network designated by the President as a critical infrastructure information system or network, periodically to demonstrate compliance with the standards established under this section.

This allows the government to force themselves directly into your home to inspect your computer; to make sure that you are complying with the NWO's bullshit enslavement directives! It is like applying maximum level sex offender registration monitoring to the very use of any computer in your own home. Bilderberg, CSIS, CFR, NCOIC will ORDER Obama to declare EVERYTHING as "critical infrastructure".

There will not be any computer, network, or internet-connected device that will be exempt from being designated as such. Their verbiage in this regard is a complete psyop: suggesting that "Don't worry, your computer or network might not be designated as such, and you might not have to worry about it". -- Bullshit. It WILL be forced on everyone.

e) FCC NATIONAL BROADBAND PLAN- In developing the national broadband plan pursuant to section 6001(k) of the American Recovery and Reinvestment Act of 2009, the Federal Communications Commission shall report on the most effective and efficient means to ensure the cybersecurity of commercial broadband networks, including consideration of consumer education and outreach programs

This means full implementation of IPv6, full implementation of RBAC enslavement on a per-person basis via biometric logon - authenticated into a global enterprise architecture where you will have zero freedom. You might as well NOT use the internet, period, because it will be completely useless.

SEC. 10. PROMOTING CYBERSECURITY AWARENESS.The Secretary of Commerce shall develop and implement a national cybersecurity awareness campaign that- (1) is designed to heighten public awareness of cybersecurity issues and concerns;(2) communicates the Federal Government’s role in securing the Internet and protecting privacy and civil liberties with respect to Internet-related activities; and(3) utilizes public and private sector means of providing information to the public, including public service announcements.

This is about using full spectrum psyops to, once again, pull the public into the illegitimate national security state paradigm - applying the same bullshit about 'going green' (e.g., communism) to the internet. The government is going to try to force you to be concerned about what they want you to be concered about: as if anything they tell you is even remotely a real threat.

SEC. 11. FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT.(a) FUNDAMENTAL CYBERSECURITY RESEARCH
(5) How to build new protocols to enable the Internet to have robust security as one of its key capabilities.

This is IPv6 TOTAL ENSLAVEMENT. IPv6 will run the cashless monetary system, it will enable the United Nations to delineate 'rights' to you, or revoke them at will, dynamically and in real-time, depending on 'how good a slave' you are in the global corporatist-feudalist prison planet. IPv6 will enable total coherency for global autonomous robotic AI systems; surveillance, weapons grids, area denial, anti-access (i.e., blocking you from travel).

SEC. 23. DEFINITIONS.In this Act:(1) ADVISORY PANEL- The term ‘Advisory Panel’ means the Cybersecurity Advisory Panel established or designated under section 3.(2) CYBER- The term ‘cyber’ means--(A) any process, program, or protocol relating to the use of the Internet or an intranet, automatic data processing or transmission, or telecommunication via the Internet or an intranet; and (B) any matter relating to, or involving the use of, computers or computer networks.

This means that simply using a computer for anything whatsoever, or even OWNING a computer, (whether or not you use it - and regardless of whether you use the internet) - it will still be subject to the total tyranny of this Bill. It will be forced into the unconstitutional high treason and psyop of "national security", and (in their context) "cybersecurity". Cybersecurity, as used in this Bill means "We own ALL digital data, and all computer technology and we can come to your home and inspect your equipment, and fine you - take you to prison, or shoot you DEAD for failing to comply with our mandates.

(3) FEDERAL GOVERNMENT AND UNITED STATES CRITICAL INFRASTRUCTURE INFORMATION SYSTEMS AND NETWORKS- The term ‘Federal Government and United States critical infrastructure information systems and networks’ includes--(A) Federal Government information systems and networks; and(B) State, local, and nongovernmental information systems and networks in the United States designated by the President as critical infrastructure information systems and networks.

Once again, EVERYTHING that facilitates freedom in any way will be designated as "critical infrastructure" - so that they can remove that freedom from you. This is being implemented regardless of the existence of this Bill - regardless of whether is does or does NOT pass!

The Bill itself means nothing because the content of the bill (and worse) will be implemented by fiat by the CSIS/NCOIC. If they pull this off, everyone face total enslavement for the rest of their lives.

Tuesday, November 3, 2009

CLARKSVILLE, Tenn. — An Army Special Forces soldier has been arrested following the discovery of about 100 pounds of explosives outside his Tennessee home.

Federal and military officials searched his home early Monday morning after a pair of hunters found the C-4 plastic explosive in a field by the house outside Clarksville. The house is near Fort Campbell, a sprawling Army post on the Tennessee-Kentucky border where the soldier is based.

Maj. April Olsen, a spokeswoman for Army Special Forces at Fort Campbell, said the soldier, who was not identified, is currently being held in the county jail.

Olsen said the search was conducted by agents from the Bureau of Alcohol, Tobacco, Firearms and Explosives, the FBI and U.S. Army criminal investigators.

Ted Denny, spokesman for the Montgomery County sheriff, said the explosives found late Sunday evening appeared to be military ordnance.

Lon Santis, manager of technical services for the Institute of Makers of Explosives, the safety and security association of the commercial explosives industry, said most C-4 explosives are used by the military, but there is limited commercial use, such as in demolitions.

Santis said the ATF has record-keeping and identification requirements they can use to track explosives, but those requirements do not apply to military explosives.

Another Fort Campbell soldier was arrested in October and charged with selling four stolen hand grenades and a stolen anti-tank rocket to an undercover officer in Tennessee.

Prosecutors said the transaction with Pfc. Joshua Bartlett Etherton, a 101st Airborne Division soldier, was arranged after police in the small town of Paris received a tip, but they would not say who he believed was the buyer.

i have not seen this story on the MSM which means he was probably a patsy (or worse) and some plan got screwed up.

Why is there an MSM blackout on this?

Quite simple really.

You can't take away anyone's rights for military explosive killing masses of people. Because you cannot buy military explosives, there is no additional tracking and tracing that you can sell to the public based on this, because the public could never get their hands on this.

You can't demonize the Internet with it either, because you cannot buy C4 on the Internet.

No, the real threat is lipstick, eye shadow, face powders, creams, nail polish remover, foundation, and so on. Because everyone can buy those, and you can create some new permanent boogey men and get the hologram Obama's reprobate lemming goon squads to report on you for so-called suspicious behavior because you are engaging in normal activities that people have since the history of when such items were invented. YOu can get people conditioned to the GIG enslavement tracking system by making EVERYTHING (not just everyone anymore) a deadly potential to cause "terror" unless it is being analyzed by biochemical, radiological, infrared, olfactory sensor, ultra violet, x-ray, sound, AI algorithm signatures of every type of movement, etc.

But the nano-thermite used on 9/11 is perfectly fine and gets zero investigation, and 100 pounds of C4 gets no investigation, because it is far less deadly than H2O2, because it kills actual harmful germs and is thus antithetical in a world where eugenics must take precedence over all else.

The discovery of this prematurely kills their ability to blame it on something else had a false flag attack been carried out using C4. And their silence on it makes them even less able to pull that off later on.

I was in E.O.D. in the military, C4 typically comes in 1/4lb rectangular sticks and is stored in multi-layered physical and electronic security locks inside heavily shielded bunkers with 3 foot thick blast doors where an officer remotely communicates with their base commander letting them know that they are accessing the explosives vault. This is not shit that you casually are able to remove without detection, even one brick, much less 400 of them.

No doubt RAND Corporation is very pissed off that this was discovered before they could order it to be used for IED's in shopping malls to usher in more of their C4ISR weapons/surveillance grid architecture as laid out in PDF documents of theirs.

Sunday, November 1, 2009

Agile software methodology enterprise architectures have preemptivley created patsies way ahead of time to serve as the cover for a full range of false flag terror attacks that the NWO has at their disposal, to be used selectively at their discretion, based on what Agile (i.e. CAESAR) tells them has the highest probability of stupefying the sheep public into buying as the most likely believable propaganda.

1st we have the circumstances all set to go for the false flag bioterror patsy angle:

Hunting Dangerous Genes, Inbox by Inbox

February 2009

The building blocks for deadly bio-weapons are available by email or online to almost anyone who cares to place an order—and the world has begun to pay attention. "Current government oversight of the DNA-synthesis industry falls short of addressing this unfortunate reality," wrote a group of academics, industry executives, and security experts in a 2007 article, "DNA Synthesis and Biological Security," which appeared in the journal Nature Biotechnology.

Addressing that scary scenario head-on is a group of MITRE experimental and computational biologists developing a method for weeding out dangerous synthetic DNA orders from harmless ones. They call their fledgling process DOTS, short for DNA Order Tracking System. And with the success of an early prototype, they now have set their sights on making DOTS available outside of the laboratory.

Some background: Genetic materials made to order from the basic chemical components of DNA are now routinely manufactured by dozens of companies in the United States and abroad. Anyone can place an email order with these DNA synthesis companies for any combination of genetic base pairs A, T, G, and C and have the order delivered. (Please see "The ABCs of ATGC," on this page.) It's also cheap: costs for DNA synthesis have fallen from $30 per base pair in 1990 to roughly 55 cents per base pair today.

So far, one factor limiting easy abuse of factory-made genetic materials is that no manufacturer has yet been able to make a DNA sequence longer than 35,000 base pairs. Because a virus like Variola major, which causes smallpox, contains 190,000 base pairs of DNA, some feel comfortable that would-be bioterrorists can't readily order such dangerous pathogens.

"Don't be so comfortable," warns John Dileo, experimental biologist and MITRE's lead in the DOTS project. "Small lengths of DNA can be ordered from multiple manufacturers and then stitched together" to make a potentially deadly virus.

MIT's Drew Endy, a leading authority on synthetically engineered pathogens, offered a simpler "genetic hack" to the audience at the 24th Chaos Congress in Berlin in 2007: "You can add key genes to an otherwise harmless but close relative to the virus" and thereby convert it to a virulent pathogen. Dileo, citing a sobering example, reckons that the ultra-deadly genome of the Ebola virus, which is fewer than 19,000 base pairs, would cost a mere $8,500 to manufacture.

Siloed Checks Provide No Safeguard

In 2005, researchers at the U.S. Centers for Disease Control and Prevention (CDC) in Atlanta, Ga., showed just how easy this process can be. They placed email orders to purchase many different DNA sequences from several manufacturers and then stitched those sequences together, thereby recreating the virus that caused the 1918 flu pandemic that killed 40 million people worldwide. Thankfully, these were the good guys—but what if they weren't?

James Diggans, Dileo's colleague and DOTS co-developer, cites published reports showing that virtually all DNA synthesizers have some kind of screening system in place to "systematically check their orders and ensure that they are not constructing and delivering dangerous DNA sequences." These screening systems, however, are designed to detect orders for large segments (more than 300 base pairs) of DNA from a single vendor. A bad actor ordering smaller segments from multiple vendors for later assembly into an infectious agent would go unnoticed, and it is this shortcoming that the DOTS system addresses.

Though a new industry, DNA synthesis is a burgeoning one. In the U.S. alone, manufacturing requests are on track to top more than 15 million orders a month by 2012, up from 9 million a month just two years ago. Overwhelmingly, the orders are from trusted government, private, and university laboratories that use the synthetic DNA for legitimate research. However, it's an order stream that is not monitored across companies in an industry that's essentially unregulated. As such, the potential for danger by those committed to the covert production of biological weapons remains unaddressed.

A recent survey conducted by the publication New Scientist found wide divergence in industry reaction to overseeing questionable DNA orders. "It's not our job," reported the director of Genemed Synthesis in California. The general manager at Bio Basic in Canada admitted only to spot-checking orders. Conversely, the president of Blue Heron in Bothell, Wash., claims that his company checks every order. And Picoscript of Houston, TX, turned down an email order from a reputable U.S. laboratory when it learned that the order was to be shipped to an unknown third party in a foreign country. For Dileo and Diggans, the lack of uniformity and siloed nature of these companies' policies is insufficient to address the threat posed by the technology.
Developing a Hard-to-Evade System

For three years now, DNA synthesizers' only defense against such orders—other than scrutinizing their own in-boxes—has been freely available software from a West Coast software development company. According to the developer, the software is "designed to identify DNA and protein sequences derived from hazardous biological agents," tracking potential problems by uploading the ordered sequence and matching them against select agents in the National Institutes of Health's GenBank genetic sequence database.

However, "the software can be evaded by breaking select agent sequences into short segments and ordering from a number of synthesis companies allowing intent to fly under the radar," contends MITRE's David Walburger, another of the DOTS researchers. That's where DOTS comes into play, say Dileo and Diggans. They recently co-presented their new order-checking software at a MITRE Lecture Series event on bio-security. They reported that DOTS scrutinizes DNA sequences from both the black list as well as a "grey list," made up of DNA sequences that could be either virulent or harmless depending on how they are used. The system also checks the additional details found in every order, such as buyer information, shipping, and other relevant data. This information becomes the input for specially designed algorithms to calculate a threat score for any one order or collection of orders. DOTS processes and re-processes the orders in the database looking for collections of DNA strings that, if stitched together, could be hazardous.

To date, the DOTS prototype can efficiently process 10,000 orders at a time on a single processor, with each screened order ranging from 20 to 300 base pairs in length. Of course, checking 10,000 orders is a far cry from the 15 million orders a month worldwide expected by 2012. The goal now is to scale up DOTS and move to a computing cluster to meet that demand.

"Based on past experience," notes Dileo, "within the next two or three years some federal agency will be given a national security mandate to be responsible for monitoring and regulating recombinant and synthetic DNA activities." Well in advance of that looming directive, the MITRE DOTS team feels confident that their DNA Order Tracking System will be ready for use by government and industry partners.

Others see danger of a more calculated variety, particularly since the 1918 viral genome was published and can now be recreated by other laboratorians using entirely synthetic materials. Among those questioning the wisdom of the research is Kenneth Alibek, MD, PhD, DSc, former chief scientist and deputy director of bioweapons research in the former Soviet Union.

Born Kanatjan Alibekov in the Soviet Republic of Kazakhstan, Alibek oversaw bioweapons research and development involving such pathogens as smallpox, anthrax, and viral hemorrhagic fevers. Now a U.S. citizen, he changed his name when he defected to the United States in 1992. Weaponizing influenza — particularly the 1918 strain — was discussed by Soviet researchers, says Alibek, now a distinguished professor in the department of molecular and microbiology at the National Center for Biodefense at George Mason University in Washington, DC.

Prior to publication, the 1918 virus research was reviewed by the National Science Advisory Board for Biosecurity, an advisory committee to the U.S. government. Julie Gerberding, MD, MPH, director of the Centers for Disease Control and Prevention, and Anthony Fauci, MD, director of the National Institute for Allergy and Infectious Diseases, issued a joint statement that read in part: “The rationale for publishing the results and making them widely available to the scientific community is to encourage additional research at a time when we desperately need to engage the scientific community and accelerate our ability to prevent pandemic influenza. . . . Moving forward with research conducted by the world’s top scientists and openly disseminating their research results remain our best defense against H5N1 avian influenza virus and other dangerous pathogens that may emerge or re-emerge, naturally or deliberately.”

=======================================================2nd we have the circumstances all set to go for the false flag nuclear (includes cyber motive as well)patsy angle:
=======================================================

The federal government mistakenly made public a 266-page report, its pages marked “highly confidential,” that gives detailed information about hundreds of the nation’s civilian nuclear sites and programs, including maps showing the precise locations of stockpiles of fuel for nuclear weapons.

The publication of the document was revealed Monday in an online newsletter devoted to issues of federal secrecy. That set off a debate among nuclear experts about what dangers, if any, the disclosures posed. It also prompted a flurry of investigations in Washington into why the document had been made public.

On Tuesday evening, after inquiries from The New York Times, the document was withdrawn from a Government Printing Office Web site.

Several nuclear experts argued that any dangers from the disclosure were minimal, given that the general outlines of the most sensitive information were already known publicly.

“These screw-ups happen,” said John M. Deutch, a former director of central intelligence and deputy secretary of defense who is now a professor at the Massachusetts Institute of Technology. “It’s going further than I would have gone but doesn’t look like a serious breach.”

But David Albright, president of the Institute for Science and International Security, a private group in Washington that tracks nuclear proliferation, said information that shows where nuclear fuels are stored “can provide thieves or terrorists inside information that can help them seize the material, which is why that kind of data is not given out.”

The information, considered confidential but not classified, was assembled for transmission later this year to the International Atomic Energy Agency as part of a process by which the United States is opening itself up to stricter inspections in hopes that foreign countries, especially Iran and others believed to be clandestinely developing nuclear arms, will do likewise.

President Obama sent the document to Congress on May 5 for Congressional review and possible revision, and the Government Printing Office subsequently posted the draft declaration on its Web site.

As of Tuesday evening, the reasons for that action remained a mystery. On its cover, the document referred to the Committee on Foreign Affairs and ordered to be printed. But Lynne Weil, the committee spokeswoman, said the committee had “neither published it nor had control over its publication.”

Gary Somerset, a spokesman for the printing office, said it had “produced” the document “under normal operating procedures” but had now removed it from its Web site pending further review.

The document contains no military information about the nation’s stockpile of nuclear arms, or about the facilities and programs that guard such weapons. Rather, it presents what appears to be an exhaustive listing of the sites that make up the nation’s civilian nuclear complex, which stretches coast to coast and includes nuclear reactors and highly confidential sites at weapon laboratories.

Steven Aftergood, a security expert at the Federation of American Scientists in Washington, revealed the existence of the document on Monday in Secrecy News, an electronic newsletter he publishes on the Web.

Mr. Aftergood expressed bafflement at its disclosure, calling it “a one-stop shop for information on U.S. nuclear programs.”

In his letter of transmittal to Congress, Mr. Obama characterized the information as “sensitive but unclassified” and said all the information that the United States gathered to comply with the advanced protocol “shall be exempt from disclosure” under the Freedom of Information Act.

The report details the locations of hundreds of nuclear sites and activities. Each page is marked across the top “Highly Confidential Safeguards Sensitive” in capital letters, with the exception of pages that detailed additional information like site maps. In his transmittal letter, Mr. Obama said the cautionary language was a classification category of the International Atomic Energy Agency’s inspectors.

The agency, in Vienna, is a unit of the United Nations whose mandate is to enforce a global treaty that tries to keep civilian nuclear programs from engaging in secret military work.

In recent years, it has sought to gain wide adherence to a set of strict inspection rules, known formally as the additional protocol. The rules give the agency powerful new rights to poke its nose beyond known nuclear sites into factories, storage areas, laboratories and anywhere else that a nation might be preparing to flex its nuclear muscle. The United States signed the agreement in 1998 but only recently moved forward with carrying it out.

The report lists many particulars about nuclear programs and facilities at the nation’s three nuclear weapons laboratories — Los Alamos, Livermore and Sandia — as well as dozens of other federal and private nuclear sites.

One of the most serious disclosures appears to center on the Oak Ridge National Laboratory in Tennessee, which houses the Y-12 National Security Complex, a sprawling site ringed by barbed wire and armed guards. It calls itself the nation’s Fort Knox for highly enriched uranium, a main fuel of nuclear arms.

The report lists “Tube Vault 16, East Storage Array,” as a prospective site for nuclear inspection. It said the site, in Building 9720-5, contains highly enriched uranium for “long-term storage.”

An attached map shows the exact location of Tube Vault 16 along a hallway and its orientation in relation to geographic north, although not its location in the Y-12 complex.

Tube vaults are typically cylinders embedded in concrete that prevent the accidental formation of critical masses of highly enriched uranium that could undergo bursts of nuclear fission, known as a criticality incident. According to federal reports, a typical tube vault can hold up to 44 tons of highly enriched uranium in 200 tubes. Motion detectors and television cameras typically monitor each vault.

Thomas B. Cochran, a senior scientist in the nuclear program of the Natural Resources Defense Council, a private group in Washington that tracks atomic arsenals, called the document harmless. “It’s a better listing than anything I’ve seen” of the nation’s civilian nuclear complex, Mr. Cochran said. “But it’s no national-security breach. It confirms what’s already out there and adds a bit more information.”

This article has been revised to reflect the following correction:

Correction: June 4, 2009
An article on Wednesday about the mistaken release of a report detailing America’s civilian nuclear complex described incorrectly a statement on the document’s cover about its publication. The statement said the document had been “referred to the Committee on Foreign Affairs and ordered to be printed.” It did not directly attribute the report’s publication to the committee.

Others see danger of a more calculated variety, particularly since the 1918 viral genome was published and can now be recreated by other laboratorians using entirely synthetic materials. Among those questioning the wisdom of the research is Kenneth Alibek, MD, PhD, DSc, former chief scientist and deputy director of bioweapons research in the former Soviet Union.

Born Kanatjan Alibekov in the Soviet Republic of Kazakhstan, Alibek oversaw bioweapons research and development involving such pathogens as smallpox, anthrax, and viral hemorrhagic fevers. Now a U.S. citizen, he changed his name when he defected to the United States in 1992. Weaponizing influenza — particularly the 1918 strain — was discussed by Soviet researchers, says Alibek, now a distinguished professor in the department of molecular and microbiology at the National Center for Biodefense at George Mason University in Washington, DC.

Prior to publication, the 1918 virus research was reviewed by the National Science Advisory Board for Biosecurity, an advisory committee to the U.S. government. Julie Gerberding, MD, MPH, director of the Centers for Disease Control and Prevention, and Anthony Fauci, MD, director of the National Institute for Allergy and Infectious Diseases, issued a joint statement that read in part: “The rationale for publishing the results and making them widely available to the scientific community is to encourage additional research at a time when we desperately need to engage the scientific community and accelerate our ability to prevent pandemic influenza. . . . Moving forward with research conducted by the world’s top scientists and openly disseminating their research results remain our best defense against H5N1 avian influenza virus and other dangerous pathogens that may emerge or re-emerge, naturally or deliberately.”

2nd we have the circumstances all set to go for the false flag nuclear (includes cyber motive as well) patsy angle:

The federal government mistakenly made public a 266-page report, its pages marked “highly confidential,” that gives detailed information about hundreds of the nation’s civilian nuclear sites and programs, including maps showing the precise locations of stockpiles of fuel for nuclear weapons.

The publication of the document was revealed Monday in an online newsletter devoted to issues of federal secrecy. That set off a debate among nuclear experts about what dangers, if any, the disclosures posed. It also prompted a flurry of investigations in Washington into why the document had been made public.

On Tuesday evening, after inquiries from The New York Times, the document was withdrawn from a Government Printing Office Web site.

Several nuclear experts argued that any dangers from the disclosure were minimal, given that the general outlines of the most sensitive information were already known publicly.

“These screw-ups happen,” said John M. Deutch, a former director of central intelligence and deputy secretary of defense who is now a professor at the Massachusetts Institute of Technology. “It’s going further than I would have gone but doesn’t look like a serious breach.”

But David Albright, president of the Institute for Science and International Security, a private group in Washington that tracks nuclear proliferation, said information that shows where nuclear fuels are stored “can provide thieves or terrorists inside information that can help them seize the material, which is why that kind of data is not given out.”

The information, considered confidential but not classified, was assembled for transmission later this year to the International Atomic Energy Agency as part of a process by which the United States is opening itself up to stricter inspections in hopes that foreign countries, especially Iran and others believed to be clandestinely developing nuclear arms, will do likewise.

President Obama sent the document to Congress on May 5 for Congressional review and possible revision, and the Government Printing Office subsequently posted the draft declaration on its Web site.

As of Tuesday evening, the reasons for that action remained a mystery. On its cover, the document referred to the Committee on Foreign Affairs and ordered to be printed. But Lynne Weil, the committee spokeswoman, said the committee had “neither published it nor had control over its publication.”

Gary Somerset, a spokesman for the printing office, said it had “produced” the document “under normal operating procedures” but had now removed it from its Web site pending further review.

The document contains no military information about the nation’s stockpile of nuclear arms, or about the facilities and programs that guard such weapons. Rather, it presents what appears to be an exhaustive listing of the sites that make up the nation’s civilian nuclear complex, which stretches coast to coast and includes nuclear reactors and highly confidential sites at weapon laboratories.

Steven Aftergood, a security expert at the Federation of American Scientists in Washington, revealed the existence of the document on Monday in Secrecy News, an electronic newsletter he publishes on the Web.

Mr. Aftergood expressed bafflement at its disclosure, calling it “a one-stop shop for information on U.S. nuclear programs.”

In his letter of transmittal to Congress, Mr. Obama characterized the information as “sensitive but unclassified” and said all the information that the United States gathered to comply with the advanced protocol “shall be exempt from disclosure” under the Freedom of Information Act.

The report details the locations of hundreds of nuclear sites and activities. Each page is marked across the top “Highly Confidential Safeguards Sensitive” in capital letters, with the exception of pages that detailed additional information like site maps. In his transmittal letter, Mr. Obama said the cautionary language was a classification category of the International Atomic Energy Agency’s inspectors.

The agency, in Vienna, is a unit of the United Nations whose mandate is to enforce a global treaty that tries to keep civilian nuclear programs from engaging in secret military work.

In recent years, it has sought to gain wide adherence to a set of strict inspection rules, known formally as the additional protocol. The rules give the agency powerful new rights to poke its nose beyond known nuclear sites into factories, storage areas, laboratories and anywhere else that a nation might be preparing to flex its nuclear muscle. The United States signed the agreement in 1998 but only recently moved forward with carrying it out.

The report lists many particulars about nuclear programs and facilities at the nation’s three nuclear weapons laboratories — Los Alamos, Livermore and Sandia — as well as dozens of other federal and private nuclear sites.

One of the most serious disclosures appears to center on the Oak Ridge National Laboratory in Tennessee, which houses the Y-12 National Security Complex, a sprawling site ringed by barbed wire and armed guards. It calls itself the nation’s Fort Knox for highly enriched uranium, a main fuel of nuclear arms.

The report lists “Tube Vault 16, East Storage Array,” as a prospective site for nuclear inspection. It said the site, in Building 9720-5, contains highly enriched uranium for “long-term storage.”

An attached map shows the exact location of Tube Vault 16 along a hallway and its orientation in relation to geographic north, although not its location in the Y-12 complex.

Tube vaults are typically cylinders embedded in concrete that prevent the accidental formation of critical masses of highly enriched uranium that could undergo bursts of nuclear fission, known as a criticality incident. According to federal reports, a typical tube vault can hold up to 44 tons of highly enriched uranium in 200 tubes. Motion detectors and television cameras typically monitor each vault.

Thomas B. Cochran, a senior scientist in the nuclear program of the Natural Resources Defense Council, a private group in Washington that tracks atomic arsenals, called the document harmless. “It’s a better listing than anything I’ve seen” of the nation’s civilian nuclear complex, Mr. Cochran said. “But it’s no national-security breach. It confirms what’s already out there and adds a bit more information.”

This article has been revised to reflect the following correction:

Correction: June 4, 2009
An article on Wednesday about the mistaken release of a report detailing America’s civilian nuclear complex described incorrectly a statement on the document’s cover about its publication. The statement said the document had been “referred to the Committee on Foreign Affairs and ordered to be printed.” It did not directly attribute the report’s publication to the committee.

3rd we have the circumstances all set to go for the false flag cyberterror/cyberattack patsy angle:

Cyberspies Penetrate U.S. Power Grid, Leave Software That Could Disrupt System April 08, 2009 9:30 AM

The intrusions were not just limited to the electrical power grid, but affected systems like water and sewage.

INSERT: WATER AND SEWAGE? REALLY? LIKE SHOWN IN THIS RED TEAM DOCUMENT, WHERE SUCH ATTACKS COULD, AND WOULD ONLY BE CARRIED OUT BY ENEMY TRAITORS THAT WORK FOR THE NEW WORLD ORDER. WHAT THE F*CK PART OF ***WE KNOW THAT YOU AHVE BULEPRINTED OUT EVERY ASPECT OF CRITICAL F*CKING INFRASTRUCTURE IN THE UNITED STATES WITH PTECH/PROMIS BASED AGILE SOFTWARE ARCHITECTURES THAT ALLOW YOU TO FALSE FLAG ATTACK THEM ACCORDING TO YOUR CRIMINAL AFCEA ORGANIZATION WHO SPONSORS SYMPOSIUMS FOR JOHN ZACHMAN, THE PROGENITOR/FATHER OF EA. SHUT THE F*CK UP WITH YOUR BULLSHIT INCESSANT LIES! NO ONE IS GOING TO BELIEVE YOU PIECES OF SHIT, YOU ARE THE TERRORISTS!

The U.S. has uncovered evidence that cyberspies, most likely from China and Russia, have penetrated the U.S. power grid and left behind software that could be activated to disrupt American infrastructure, FOX News confirmed Wednesday.

The "intrusions," first reported by The Wall Street Journal, have occurred over a period of time, one U.S. official said -- not all at once.

The breaches are "something we're concerned about," a U.S. official told FOX News.

The concern is that any software could be activated at a later date to disrupt critical systems.

2nd we have the circumstances all set to go for the false flag nuclear (includes cyber motive as well) patsy angle:

The federal government mistakenly made public a 266-page report, its pages marked “highly confidential,” that gives detailed information about hundreds of the nation’s civilian nuclear sites and programs, including maps showing the precise locations of stockpiles of fuel for nuclear weapons.

The publication of the document was revealed Monday in an online newsletter devoted to issues of federal secrecy. That set off a debate among nuclear experts about what dangers, if any, the disclosures posed. It also prompted a flurry of investigations in Washington into why the document had been made public.

On Tuesday evening, after inquiries from The New York Times, the document was withdrawn from a Government Printing Office Web site.

Several nuclear experts argued that any dangers from the disclosure were minimal, given that the general outlines of the most sensitive information were already known publicly.

“These screw-ups happen,” said John M. Deutch, a former director of central intelligence and deputy secretary of defense who is now a professor at the Massachusetts Institute of Technology. “It’s going further than I would have gone but doesn’t look like a serious breach.”

But David Albright, president of the Institute for Science and International Security, a private group in Washington that tracks nuclear proliferation, said information that shows where nuclear fuels are stored “can provide thieves or terrorists inside information that can help them seize the material, which is why that kind of data is not given out.”

The information, considered confidential but not classified, was assembled for transmission later this year to the International Atomic Energy Agency as part of a process by which the United States is opening itself up to stricter inspections in hopes that foreign countries, especially Iran and others believed to be clandestinely developing nuclear arms, will do likewise.

President Obama sent the document to Congress on May 5 for Congressional review and possible revision, and the Government Printing Office subsequently posted the draft declaration on its Web site.

As of Tuesday evening, the reasons for that action remained a mystery. On its cover, the document referred to the Committee on Foreign Affairs and ordered to be printed. But Lynne Weil, the committee spokeswoman, said the committee had “neither published it nor had control over its publication.”

Gary Somerset, a spokesman for the printing office, said it had “produced” the document “under normal operating procedures” but had now removed it from its Web site pending further review.

The document contains no military information about the nation’s stockpile of nuclear arms, or about the facilities and programs that guard such weapons. Rather, it presents what appears to be an exhaustive listing of the sites that make up the nation’s civilian nuclear complex, which stretches coast to coast and includes nuclear reactors and highly confidential sites at weapon laboratories.

Steven Aftergood, a security expert at the Federation of American Scientists in Washington, revealed the existence of the document on Monday in Secrecy News, an electronic newsletter he publishes on the Web.

Mr. Aftergood expressed bafflement at its disclosure, calling it “a one-stop shop for information on U.S. nuclear programs.”

In his letter of transmittal to Congress, Mr. Obama characterized the information as “sensitive but unclassified” and said all the information that the United States gathered to comply with the advanced protocol “shall be exempt from disclosure” under the Freedom of Information Act.

The report details the locations of hundreds of nuclear sites and activities. Each page is marked across the top “Highly Confidential Safeguards Sensitive” in capital letters, with the exception of pages that detailed additional information like site maps. In his transmittal letter, Mr. Obama said the cautionary language was a classification category of the International Atomic Energy Agency’s inspectors.

The agency, in Vienna, is a unit of the United Nations whose mandate is to enforce a global treaty that tries to keep civilian nuclear programs from engaging in secret military work.

In recent years, it has sought to gain wide adherence to a set of strict inspection rules, known formally as the additional protocol. The rules give the agency powerful new rights to poke its nose beyond known nuclear sites into factories, storage areas, laboratories and anywhere else that a nation might be preparing to flex its nuclear muscle. The United States signed the agreement in 1998 but only recently moved forward with carrying it out.

The report lists many particulars about nuclear programs and facilities at the nation’s three nuclear weapons laboratories — Los Alamos, Livermore and Sandia — as well as dozens of other federal and private nuclear sites.

One of the most serious disclosures appears to center on the Oak Ridge National Laboratory in Tennessee, which houses the Y-12 National Security Complex, a sprawling site ringed by barbed wire and armed guards. It calls itself the nation’s Fort Knox for highly enriched uranium, a main fuel of nuclear arms.

The report lists “Tube Vault 16, East Storage Array,” as a prospective site for nuclear inspection. It said the site, in Building 9720-5, contains highly enriched uranium for “long-term storage.”

An attached map shows the exact location of Tube Vault 16 along a hallway and its orientation in relation to geographic north, although not its location in the Y-12 complex.

Tube vaults are typically cylinders embedded in concrete that prevent the accidental formation of critical masses of highly enriched uranium that could undergo bursts of nuclear fission, known as a criticality incident. According to federal reports, a typical tube vault can hold up to 44 tons of highly enriched uranium in 200 tubes. Motion detectors and television cameras typically monitor each vault.

Thomas B. Cochran, a senior scientist in the nuclear program of the Natural Resources Defense Council, a private group in Washington that tracks atomic arsenals, called the document harmless. “It’s a better listing than anything I’ve seen” of the nation’s civilian nuclear complex, Mr. Cochran said. “But it’s no national-security breach. It confirms what’s already out there and adds a bit more information.”

This article has been revised to reflect the following correction:

Correction: June 4, 2009
An article on Wednesday about the mistaken release of a report detailing America’s civilian nuclear complex described incorrectly a statement on the document’s cover about its publication. The statement said the document had been “referred to the Committee on Foreign Affairs and ordered to be printed.” It did not directly attribute the report’s publication to the committee.

3rd we have the circumstances all set to go for the false flag cyberterror/cyberattack patsy angle:

Cyberspies Penetrate U.S. Power Grid, Leave Software That Could Disrupt System April 08, 2009 9:30 AM

The intrusions were not just limited to the electrical power grid, but affected systems like water and sewage.

INSERT: WATER AND SEWAGE? REALLY? LIKE SHOWN IN THIS RED TEAM DOCUMENT, WHERE SUCH ATTACKS COULD, AND WOULD ONLY BE CARRIED OUT BY ENEMY TRAITORS THAT WORK FOR THE NEW WORLD ORDER. WHAT THE F*CK PART OF ***WE KNOW THAT YOU AHVE BULEPRINTED OUT EVERY ASPECT OF CRITICAL F*CKING INFRASTRUCTURE IN THE UNITED STATES WITH PTECH/PROMIS BASED AGILE SOFTWARE ARCHITECTURES THAT ALLOW YOU TO FALSE FLAG ATTACK THEM ACCORDING TO YOUR CRIMINAL AFCEA ORGANIZATION WHO SPONSORS SYMPOSIUMS FOR JOHN ZACHMAN, THE PROGENITOR/FATHER OF EA. SHUT THE F*CK UP WITH YOUR BULLSHIT INCESSANT LIES! NO ONE IS GOING TO BELIEVE YOU PIECES OF SHIT, YOU ARE THE TERRORISTS!

The U.S. has uncovered evidence that cyberspies, most likely from China and Russia, have penetrated the U.S. power grid and left behind software that could be activated to disrupt American infrastructure, FOX News confirmed Wednesday.

The "intrusions," first reported by The Wall Street Journal, have occurred over a period of time, one U.S. official said -- not all at once.

The breaches are "something we're concerned about," a U.S. official told FOX News.

The concern is that any software could be activated at a later date to disrupt critical systems.

INSERT: JUST LIKE HOW CRIMINAL ENEMY TERRORIST TRAITOR AMIT YORAN OVERSAW THE CYBER FALSE FLAG BETA TEST AT DHS WITH PTECH USING UNOBTRUSIVE MICROWAVE HACKING TO FORCE THE SCADA COMPONENTS TO MODULATE THE AC SINEWAVE FREQUENCY FAR ENOUGH AWAY FROM 60 HZ SO THAT IT WOULD EXPLODE--THE VIDEO THAT YOU HAD THAT WAS FUOU, BUT YOU SLAPPED WITH THE CLASSIFIED DESIGNATION FOR "NATIONAL SECURITY" BECAUSE YOU DIDN'T WANT ANYONE TO FIGURE OUT THAT THAT WAS A TEST RUN FOR HOW YOU PLAN TO ATTACK U.S. CRITICAL INFRASTRUCTURE DURING A FALSE FLAG ATTACK THAT YOU WOULD PLAN YEARS LATER TO USE DURING A MANUFACTURED BIOWEAPON FLU.

The intrusions were not just limited to the electrical power grid, but affected systems like water and sewage. The motivation for the breaches is not well understood, and while the electronic trail appears to lead to China and Russia, it is not clear whether these actions were state-sponsored.

The Washington embassies of China and Russia deny involvement.

According to The Wall Street Journal, the espionage appeared pervasive across the country and did not target any particular region or company.

The intrusions were in many cases detected by U.S. intelligence agencies, not the companies, officials told the Journal.

"If we go to war with them, they will try to turn them on," one official told the Journal.

I almost forgot: the radiological angle that their Agile software methodology calculated for them, BUT FAILED--because someone who was not being observed within their OODA loop of this planned FALSE FLAG, DISRUPTED IT AND DESTROYED IT ENTIRELY BY DESTROYING THE PATSY BEFORE HE COULD ACT.

BELFAST, Maine - James G. Cummings II was known as "kind of a violent dude" back home in Fort Bragg, Calif., according to Lt. Rusty Noe of the Mendocino County Sheriff's Office.

"He was involved in several assault cases," Noe said in a telephone interview Wednesday evening. "He was a victim in some, a suspect in others, most of them involving family."

But despite the 16 contacts the sheriff's office had with him in the late 1990s, Noe sounded surprised to learn of recent allegations that Cummings was a white supremacist with a cache of radioactive materials and directions for building a dirty bomb in his Belfast home. [Profile of a patsy, look into connections with this guy and government agencies. He could be one of the "Homegrown" patsies that they have available. Look how everyone is completely quiet about this one.]

"The guys say they never knew him to be a Neo-Nazi type," Noe said. "He seemed like he was a kind of angry dude that argued with the family."

Police say that Cummings was shot to death by his wife, Amber B. Cummings, two months ago, in what they have described as a domestic violence homicide. He had no criminal history in Maine.

There was even less information readily available about Amber Cummings, whose maiden name may have been Brown. Cummings didn't answer the phone at her Belfast home Wednesday afternoon.

It wasn't clear Wednesday why the Cummingses moved to their home at 346 High Street in Belfast.

There are three vehicles registered to the couple with the office of the Maine Secretary of State: a 2000 Jeep Wrangler, a 1999 Dodge Durango and a 1998 motor home.

All in all, a modest lifestyle for a man who came from a California family as wealthy as it was troubled. His father, James G. Cummings Sr., made a fortune in real estate and was a well-known local philanthropist before being shot to death at his home in 1997, according to newspaper accounts.

Just months before his father's death, when James G. Cummings II was 17, he made the national news - including Oprah - when he and his father allegedly conspired to secretly videotape his mother in the act of using hard drugs, according to the archives of the Anderson Valley Advertiser.

"The national media swooped down on Fort Bragg, and there was a 24-hour cacophony about kids spying on parents," wrote Bruce Anderson in a 2002 story. "[They] were long gone by the time it was found that Mom had been brewing up popcorn balls for the kids, not black tar heroin."

Mark Scaramella, the managing editor of the paper, said Wednesday that Cummings and his sister, Kathryn, sued to get more of their father's estate in the early 2000s.

It isn't clear how much they inherited, but the father's trust fund reportedly earns an estimated annual income of $10 million.

When asked about a neo-Nazi presence in Fort Bragg, Scaramella chuckled.

"There are some red-necky sorts of skinheady people," he said. "I don't think they read enough to be neo-Nazis."

A leaked FBI report states that a man named James G. Cummings was trying to build a dirty bomb when he was shot and and killed by his wife last December 9th in Belfast, Maine. He had plans, parts, explosive ingredients, and small quantities of radioactive material, though nothing that could not be purchased legally within the US. Cummings was a white supremacist who was reportedly very upset about Obama’s election.

The leaked document has been posted on Wikileaks since January 16th. While the material concerning Cummins was first noticed by the rumor site Unattributable.com on January 19th, only yesterday was there any sort of story about it in the mainstream media, in this case the local Bangor Daily News.

Although this dastardly plot was probably not much more dangerous to the public than a garden-variety bomb, this man would certainly qualify as a bona fide “terrorist” under Bush-regime logic. Or at least he would if he was Arab. In point of fact, he actually is a threat to the public, or was. So why haven’t we heard about it? Are crazy white supremacists somehow less of a threat than crazy fundamentalist muslims?

The FBI report notes:

State authorities detected radiation emissions in four small jars in the residence labeled ‘uranium metal’, as well as one jar labeled ‘thorium.’ The four jars of uranium carried the label of an identified US company. Further preliminary analysis on 30 December 2008 indicated an unlabeled jar to be a second jar of thorium. Each bottle of uranium contained depleted uranium 238. Analysis also indicated the two jars of thorium held thorium 232.

Depleted uranium (DU), the by-product of uranium enrichment for use in nuclear power plants or weapons, is not terribly radioactive and is reportedly not very suitable for use in a dirty bomb. Thorium is similarly weakly radioactive, and can be purchased legally through chemical supply companies (such as Fisher Scientific). Dispersal of these isotopes wouldn’t exactly be healthy — they’re both considered carcinogens, and DU has been well documented to cause birth defects, which is why the US and Israeli armies really shouldn’t be spraying foreign countries with DU bullets. However, a depleted uranium/thorium bomb couldn’t really be considered a weapon of mass destruction.

Still, the man was on his way to building some sort of upsetting bomb. Aside from the nastyness of bombings of any sort, I am quite sure the headlines screaming “radioactivity” wouldn’t bother with the scientific subtleties I just covered. I for one am glad that the FBI finally clued in — though only because these materials were found after Cummins was shot and killed by his wife, who claimed she was defending herself after years of physical and sexual abuse.

This is all very strange, and I am left with questions.

1. Given this foiled plot, the sadly succesful Oklahoma City bombing of 1995, and other deranged loners such as the Unabomber, what is the actual risk to the public from foreign jihadists versus homegrown wackjobs, of which there are apparently plenty? [UPDATE: See also the Texas militia with a sodium cyanide bomb in 2003]

2. Do the DHS and the FBI know the true answer to this question? Are they allocating their resources appropriately? How come we only found out about this plot accidentally?

3. Again, the mainstream media still haven’t touched the story. Would this have been an instant headline if the guy was muslim?

4. If domestic terrorists don’t count, why not? Is it because they’re useless in justifying foreign wars? Or is mostly ignoring them the right response, implying that we are far too jumpy about terrorism in general?

5. This is completely ridiculous in so many ways. When do we, as a culture, decide to think rationally about terrorism?

And what would a rational approach be to terrorism be? I suggest public health as a model, which would doubtless show that if saving lives and property is the aim, we are wasting our time and money with “terrorism” as compared to, oh, I don’t know, obesity, car accidents, and global climate change.

OH WOW, LOOK WE ALSO HAVE A SMALL EXAMPLE OF THE EXPLOSIVE PATSY ANGLE COVERED.

UPDATE: The Frederick Police Department says they have surveillance tape of the theft and believe a white man between the ages of 45 and 50 may be the suspect.

Investigators believe the theft occurred on Sunday afternoon.

The contents of the fertilizer have the police concerned that it could be used for making a bomb.

The thief stole two types of fertilizer: Triple 19 and Urea. Police say the Urea is more dangerous of the two because it contains hydrogen.

“We want to make sure that we covered all bases. We want to make sure that the Frederick community understands that we are following through as far as we can possible go with FBI and other agencies,” said Lt. Clark Pennington with the Frederick Police Department.

Frederick police say four tons of fertilizer have been stolen from a farm supply store.

A store representative told police that 2,000 pounds of urea and 6,000 pounds of other fertilizer are missing. The fertilizer was in white 50-pound bags with a company logo.

Lt. Clark Pennington says they don’t know what the motive behind the theft is, but they have notified the Maryland Coordination Analysis Center, which alerts all federal agencies of the theft.
_____________________________________________________________LMFAO? They can ignore Radioactive materials for a real dirty b0mb, but go balls out insane over fertilizer? HAHAHAHAHAHA WTF!? Hey, FBI, if you're reading this, why not give me a job? LOL I can do a better job investigating than you guys! I actually catch REAL terrorists! And you wouldn't get away trying to carry out false flags on my watch!